top of page
commonwealth-bank-logo.webp

Growth at CBA

Built high performing security architecture teams supporting change activities for Cyber and business platforms such as End User Experience and Chief Data Office. Internal recognition for hiring the right talent and building and nurturing dynamic teams creating culture that is engaging, inclusive while maintaining strong retention.

​

Member of review boards in governance roles reviewing risks and designs decisions, escalation point providing direction and advice aligning business and security objectives.

​

Deliver architecture assessment leveraging attack and threat modeling frameworks with control and risk identification and risk mitigation techniques.

​

Implemented agile methodology into architecture practices driving change to governance processes in alignment with delivery strategy.

​

Developed threat modeling practices and implemented quality assurance within architecture practices to improve and standardise architecture artefacts meeting continuous improvement objectives.

​

Uplifted standards, policy and guidelines supporting information security policy framework including Identity and Access, Information Classification and Handling and standards and consulted on Cryptography.

​

Advisor to risk teams on cybersecurity risks, developed remediation plans for addressing prioritised risks, identifying key issues and actions for execution including zero exploits such as log4j. Advisor to control owners on best practices for design and operating controls (Database Activity Monitoring Control), maturity uplift aligned to maturity models such as Essential 8 (Office Macro, Application Control, Application hardening, restricting admin privileges, patch management).

 

Advisor to Cyber on how to achieve Zero Trust by contributing to abstract on the topic translating architecture direction into change activities required to achieve target state. His contributions validated the positional direction of enabling identity as the next step in the journey from delivering on flow policy whilst embarking on network controls uplift embedding trust and verify principles into target state integration architecture aimed at verifying users and devices access prior to granting access to resources.

 

Lead in major technology programs centered around the establishment of cloud platform of Azure and AWS, architecture for Identity in Azure and AWS addressing authentication and authorization for human and non human entities and implementing just-in-time models (PIM).

 

Lead high risk remediation design addressing DLP and encryption on data office core platform including assessing and reviewing target risk activities. The successful downgrade of risk met key risk outcomes for GM of the business function.

 

Lead security architecture in uplift of vulnerability management programs, application patching and restriction of admin privileges to meet (Qualys and Tanium, application control) to meet Essential 8 maturity requirements meeting Cyber strategic intent.

 

Key contributor to reference architecture by reviewing, providing guidance to aligned solution architect and supporting through review boards. Key reference architectures include Identity and Access, Network and Data storage.

 

Lead security uplift initiatives in transforming delivery service to enable agile and dev-ops practices leveraging both public and private cloud services. These cloud services included Azure, AWS and VMWare.

 

As Principal lead teams in design security solutions covering a broad spectrum of security services leveraging CI/CD frameworks enabling automation with emphasis on delivery velocity and early risk identification and mitigation adopting shift left thinking.

bottom of page